About your Search

20130416
20130424
Search Results 0 to 10 of about 11
. the pace of technology change and spread of advanced military technology to state and nonstate actors pose an encreasing challenge to america's military. this is the environment that is facing the department of defense as it enters a third year of flat or declining budgets. the onset of these constraints has led to belt tightening in military modernization, force structure, personnel costs and overhead expenditures. it has given us the opportunity to reshape the military and reform defense institutions to better reflect 21st century realities. the process began under the leadership of secretary gates. secretary gates curtailed more than 30 modernization programs and trimmed overhead costs within the military services and across the defense enterprise. the realignment continued secretary panetta who crafted new strategic guidance in an f.y. 2013 defense budget plan which reduced the department's top line by $487 billion over the course of a decade. the president's request of $526.6 billion for fy 2014 continues to implement the president's defense strategic guidance and enhances the departm
personnel along our borders as well as utilization of proven surveillance technology along the highest traffic areas across the southwest border. reducing wait times at the ports of entry the budget requests 35rks00 port officers. to scurel maritime borders the budget invests in coast guard assets, including the seven national security cutter and fast response cutters. the bum continues the department's focus on smart enforcement of our country's immigration laws. it supports the administration's effort to focus the enforcement system on safety threats and the integrity of the immigration system through childhood arrivals and greater use of rosecutor yull discretion. we support more cost effective initiatives of secure communities. e budget invests in monitory compliance to work sight related laws. while continuing to support alternatives to the tension, detention reform and immigrant immigration efforts. comprehensive immigration reform will help us build on these efforts and strengthen boarder security by enabling d.h.s. while focusing on criminals, human smallingers and those who im
allocations and potentially alternative technologies that might augment oral replace ship assets we can really trace from the specificics observation that needs to be made to whatever mixture of ways to make it. maybe available to us and provide the best balanced approach to fulfilling those needs. that's called -- we've called that our fleet composition plan. it's been buttoned up in the last couple of weeks. we look forward to discuss that with you in the months ahead. that will be one underpinning. secondly, we have a fleet allocation and planning process that is headed by the head of complete rps with a and participation with the mission and science managers. it is in that form that we trace the available ship capabilities, the equipment of the vessels by priority by priority. >> admiral, i had a question. i don't mean to inject you in another controversial issue, but -- >> what the heck? >> what the heck, we're here anyway. border security, particularly the southern border. as many of us who live in areas where there's water understand, and particularly the entire coastal region is poten
and can only respond to known threats. cyberthreats evolve at the speefed technology and this measure helps the private sector protect against cyberattacks by providing companies with the latest cyberthreat information from the intelligence community which has timely classified information about destructive malware. this cyberthreat intelligence is the information that companies and the government need to protect and defend their networks. the so-called signatures are primarily made up of numerical codes consisting of zeros and ones without any perm information attached. -- any personal information atammed. cispa is a result of cooperation between the community, companies and to a certain degree the white house as it pertains to many measures included in this legislation. during their efforts to improve the bill, they also maintain a dialogue with privacy advocates in an effort to strengthen civil liberties, protections and oversights. i had a personal note here for the reason that over a period of 10 years i served eight of those years on the intelligence committee. and the now chair
to have more flexibility in the times of services we provide. technology is going to transform the mail industry in a lot of new and exciting ways and we need to support that speed-up in the transformation. it's not hard to imagine that customers' expectations are going to change dramatically in the coming years. they already have been. customers' tastes are changing. imagine being able to use your smart phone to redirect your male and packages. having them clevered to a current location you're at right now. imagine being able to use a mobile a.m. that has the ability to display what you're going to get in your mailbox over the next few days. that's going to create opportunities for marketers. when you think about all the emails and messages you get today, the mail is the one blast last place where you can get a surprise and there's a lot of peapings you can build around that. imagine if you were to get a notification the moment that your packages and your mail were delivered to your door. imagine if the mail carrier technology enabled so was half a piece of male on a smart phone and n
and the military side. i've constantly tried to improve how we address the need for the next generation technology, public-private cooperation and ensuring that we have the price personnel to counter this 21st century cyberthreat. however, i am uncompromising in safeguarding the rights of our citizens and i will never sacrifice our civil liberties for unneeded intrusion. to this end, the amendment i am offering today would strengthen existing provisions in the bill to include the privacy officer and the officer for civil rights and civil liberties of the department of homeland security askey stakeholders in the report that would a-- as key stakeholders in the report. this report would assess how this legislation affected our civil liberties and privacy throughout our federal government, and the department of homeland security is the -- the key civil department in our federal government that develops and implements cybersecurity protocalls for the rest of the -- protocols for the rest of the federal government. it is crucial that they be part of any assessment and work with both the privacy office
, technology, and infrastructure changes. that also was a big change. all of the money had gone into border patrol in the past year the new effort was to try to get a much more effective combination of researchers spirit that continues today. i predict that when the new bill comes out, there will be all kinds of focus on drones and more modern technology, etc.. that combination has been a very important change, as well. tober three, they all have do with efforts made on the u.s. side, principles used that involved mexico in varying degrees. the fourth one of those principles had to do with the engagement with stakeholders, in commuties as ll as the mexican government. and cooperation and increased cooperation coronation with mexico. that idea led to all kinds of community-based mechanisms, advisory committees, stakeholders with the border patrol. it also had to do with systematic operation, law enforcement agency to law enforcement agency, between the u.s. border patrol, as well as others on the ground, and mexico. there have been ups and downs over the years. but those efforts at professio
to our critical infrastructure. >> how do you work to prevent this? >> we have technology, cyber technologies, prevention technologies. we spend a lot of time now on technologies.
as technology and people become more savvy? what are we doingak c protect ourselves from things tt are chemical, biological, and radiological? >> gen 3 is undergoing an assessment as to whether it will ultimately be it for the money we are putting into it. rather than head into a large aqueous vision -- a large acquisition, there are enough problems with it that our acquisitions review board has asked for an individual assessment that is on a timeline. there is carryover money that can be deployed. it is really a matter of let's make sure that he forward to a large acquisition, we really know what we are doing and what we are getting. or have been problems with the gen 3.tages of jen -- one i would point to is a major whicht by the president is that national bio facility in kansas. we have been for a long time we knew -- need a new level for lab. they kansas legislature has agreed to put in roughly $300 million. we put in 700 million or so for the facility. -- if this is approved and appropriated, we can begin to structure and of a major lap and be done by 2020. i think long-term infrastructure
records are prime targets for attackers to steal. according to the information technology industry council, 18 adults become victims to cybercrime, including identity campaigns ishing every second. this adds up to 1 1/2 million cybercrime victims each day. cyberattacks present a very real and dangerous threat to the united states, however the government currently
of environmental degradation. wh fnetic pace of technolocal change and the spread of advanced military technology to state and non- state actors pose an increasing challenge to america's military. this is the strategic environment facing the department of defense as it enters a third year of flat or declining budgets. the onset of these resource constraints has already led to significant and ongoing belt- tightening in military modernization, force structure, personnel costs, and overhead expenditures. it has also given us an opportunity to reshape the military and reform defense institutions to better reflect 21st century realities. the process began under the leadership of secretary gates, who canceled or curtailed more than 30 modernization programs and trimmed overhead within the military services and across the defense enterprise. these efforts reduced the department's topline by $78 billion over a five year period, as detailed in the department's fy 2012 budget plan. the realignment continued under secretary panetta, who worked closely with the president and the joint chiefs of staff to cra
Search Results 0 to 10 of about 11